IOC Report
AutoHotkey_2.0.12_setup.exe

loading gif

Files

File Path
Type
Category
Malicious
AutoHotkey_2.0.12_setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\UX\Templates\Minimal for v2.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\WindowSpy.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\CommandLineToArgs.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\CreateAppShortcut.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\EnableUIAccess.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\GetGitHubReleaseAssetURL.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\HashFile.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\README.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\ShellRun.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\bounce-v1.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\common.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\config.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\identify.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\identify_regex.ahk
ASCII text, with very long lines (3982), with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\launcher-common.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\spy.ico
MS Windows icon resource - 4 icons, 32x32 with PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 48x48 with PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\ui-base.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\install-ahk2exe.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\install-version.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\install.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\launcher.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\reload-v1.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\reset-assoc.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\ui-dash.ahk
C source, Unicode text, UTF-8 text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\ui-editor.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\ui-launcherconfig.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\ui-newscript.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\ui-setup.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\ui-uninstall.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\license.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\v2\AutoHotkey.chm
MS Windows HtmlHelp Data
dropped
malicious
C:\Program Files\AutoHotkey\v2\AutoHotkey32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\v2\AutoHotkey64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\v2\RCX9FF7.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\v2\RCXA0E2.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey.chm
MS Windows HtmlHelp Data
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\Install.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\Templates\Minimal for v2.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\WindowSpy.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\CommandLineToArgs.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\CreateAppShortcut.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\EnableUIAccess.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\GetGitHubReleaseAssetURL.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\HashFile.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\README.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\ShellRun.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\bounce-v1.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\common.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\config.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\identify.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\identify_regex.ahk
ASCII text, with very long lines (3982), with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\launcher-common.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\spy.ico
MS Windows icon resource - 4 icons, 32x32 with PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 48x48 with PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\ui-base.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install-ahk2exe.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install-version.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\launcher.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\reload-v1.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\reset-assoc.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-dash.ahk
C source, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-editor.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-launcherconfig.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-newscript.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-setup.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-uninstall.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\WindowSpy.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\license.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\UX\installed-files.csv
CSV text
dropped
C:\Program Files\AutoHotkey\WindowSpy.ahk
C source, ASCII text
dropped
C:\Program Files\AutoHotkey\v2\AutoHotkey32_UIA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\AutoHotkey\v2\AutoHotkey64_UIA.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoHotkey Dash.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Archive, ctime=Thu Apr 18 23:14:30 2024, mtime=Thu Apr 18 23:14:30 2024, atime=Thu Apr 18 23:14:30 2024, length=1256448, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoHotkey Window Spy.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Thu Apr 18 23:14:30 2024, mtime=Thu Apr 18 23:14:32 2024, atime=Thu Apr 18 23:14:30 2024, length=1256448, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\f213bf5a8af890680781f9b7261613ea_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
There are 69 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
"C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe"
malicious
C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
"C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe" /to "C:\Program Files\AutoHotkey"
malicious
C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
"C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" "C:\Program Files\AutoHotkey\UX\reset-assoc.ahk" /check
malicious
C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
"C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" UX\ui-dash.ahk
malicious

URLs

Name
IP
Malicious
https://autohotkey.com/board/topic/66139-ahk-l-calculating-md5sha-checksum-from-file/
unknown
https://autohotkey.com(
unknown
https://www.autohotkey.com/download/
unknown
https://www.autohotkey.com/docs/v2/
unknown
https://www.autohotkey.com/docs/v1/
unknown
https://autohotkey.comD
unknown
http://msdn.com/library/bb756929
unknown
https://autohotkey.comAutoHotkey
unknown
https://autohotkey.com
unknown
https://api.github.com/repos/
unknown
https://autohotkey.comCould
unknown
https://www.autohotkey.com/docs/v2/misc/Editors.htm
unknown
There are 2 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\05DBEF8D5C39D139DDC008D18ADCE6EC816C933F
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\05DBEF8D5C39D139DDC008D18ADCE6EC816C933F
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\05DBEF8D5C39D139DDC008D18ADCE6EC816C933F
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\05DBEF8D5C39D139DDC008D18ADCE6EC816C933F
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\05DBEF8D5C39D139DDC008D18ADCE6EC816C933F
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\05DBEF8D5C39D139DDC008D18ADCE6EC816C933F
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\AutoHotkey
InstallDir
HKEY_LOCAL_MACHINE\SOFTWARE\AutoHotkey
InstallCommand
HKEY_LOCAL_MACHINE\SOFTWARE\AutoHotkey
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ahk
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ahk\ShellNew
Command
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ahk\PersistentHandler
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript
AppUserModelID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Open
FriendlyAppName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Open\Command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Open
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Open
AppUserModelID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\RunAs\Command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\RunAs
HasLUAShield
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\UIAccess\Command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\UIAccess
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Launch\Command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Launch
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Launch
ProgrammaticAccessOnly
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Edit\Command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Edit
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
There are 29 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8C6000
unkown
page execute and read and write
4D58000
heap
page read and write
34E0000
heap
page read and write
1400FB000
unkown
page readonly
13BE000
stack
page read and write
538E000
heap
page read and write
4D93000
heap
page read and write
EBD000
heap
page read and write
4D93000
heap
page read and write
8D6000
heap
page read and write
2BE9000
heap
page read and write
E65000
heap
page read and write
7F9000
stack
page read and write
DD2000
heap
page read and write
17C0000
heap
page read and write
4D50000
heap
page read and write
4D62000
heap
page read and write
4D48000
heap
page read and write
33E6000
heap
page read and write
938000
unkown
page execute and write copy
4D66000
heap
page read and write
E6A000
heap
page read and write
148000
heap
page read and write
7B6000
stack
page read and write
4D6C000
heap
page read and write
4D7A000
heap
page read and write
33EC000
heap
page read and write
DF8000
heap
page read and write
E35000
heap
page read and write
DB2000
heap
page read and write
4D7A000
heap
page read and write
4D63000
heap
page read and write
4DA9000
heap
page read and write
3500000
heap
page read and write
523F000
stack
page read and write
EBA000
heap
page read and write
941000
heap
page read and write
922000
heap
page read and write
F9000
heap
page read and write
8EF000
heap
page read and write
14012A000
unkown
page readonly
E50000
heap
page read and write
D90000
heap
page read and write
33E1000
heap
page read and write
17F0000
heap
page read and write
4D62000
heap
page read and write
1D0000
heap
page read and write
7DE000
stack
page read and write
EDB000
heap
page read and write
3220000
trusted library allocation
page read and write
14E000
stack
page read and write
4DFE000
heap
page read and write
34B9000
heap
page read and write
DF0000
heap
page read and write
400000
unkown
page readonly
E5C000
heap
page read and write
4D6C000
heap
page read and write
33EA000
heap
page read and write
4D62000
heap
page read and write
4CE000
unkown
page execute and read and write
1918000
heap
page read and write
92E000
heap
page read and write
3290000
heap
page read and write
31EE000
stack
page read and write
140127000
unkown
page read and write
926000
heap
page read and write
926000
heap
page read and write
4DA9000
heap
page read and write
34E4000
heap
page read and write
1780000
heap
page read and write
4E1B000
heap
page read and write
E36000
heap
page read and write
1400DF000
unkown
page readonly
E53000
heap
page read and write
E5F000
heap
page read and write
7E5000
stack
page read and write
33E2000
heap
page read and write
2FA0000
heap
page read and write
EC8000
heap
page read and write
EBD000
heap
page read and write
7AD000
stack
page read and write
4DAA000
heap
page read and write
33E3000
heap
page read and write
4DF4000
heap
page read and write
4D7B000
heap
page read and write
7BE000
stack
page read and write
1C3000
heap
page read and write
4E15000
heap
page read and write
EBD000
heap
page read and write
140121000
unkown
page read and write
4DE4000
heap
page read and write
840000
heap
page read and write
345C000
stack
page read and write
8C0000
heap
page read and write
140123000
unkown
page read and write
14012A000
unkown
page readonly
159000
heap
page read and write
EC4000
heap
page read and write
4D4D000
heap
page read and write
17F8000
heap
page read and write
545B000
heap
page read and write
D8E000
stack
page read and write
33E9000
heap
page read and write
4F4000
unkown
page execute and read and write
4D9E000
heap
page read and write
D3C000
stack
page read and write
4DA9000
heap
page read and write
653D000
stack
page read and write
4D50000
heap
page read and write
4DA9000
heap
page read and write
4E16000
heap
page read and write
140000000
unkown
page readonly
7BE000
stack
page read and write
33EF000
heap
page read and write
170000
heap
page read and write
D30000
heap
page read and write
92F000
heap
page read and write
4DF1000
heap
page read and write
142000
heap
page read and write
7CE000
stack
page read and write
4D62000
heap
page read and write
1E0000
heap
page read and write
CE0000
trusted library section
page read and write
4DF7000
heap
page read and write
4CD0000
heap
page read and write
33E1000
heap
page read and write
EC2000
heap
page read and write
922000
heap
page read and write
E5F000
heap
page read and write
17BF000
stack
page read and write
1C7000
heap
page read and write
4CD8000
heap
page read and write
941000
heap
page read and write
E63000
heap
page read and write
4DF1000
heap
page read and write
4DBA000
heap
page read and write
7AA000
unkown
page execute and read and write
4D58000
heap
page read and write
12CE000
stack
page read and write
4D50000
heap
page read and write
D1E000
stack
page read and write
7EE000
stack
page read and write
99000
stack
page read and write
2BE0000
heap
page read and write
4DA9000
heap
page read and write
120000
heap
page read and write
4DF4000
heap
page read and write
6D3D000
stack
page read and write
D00000
trusted library section
page read and write
11BE000
stack
page read and write
4DA9000
heap
page read and write
4D7A000
heap
page read and write
4D48000
heap
page read and write
7F8000
stack
page read and write
EBE000
heap
page read and write
ED3000
heap
page read and write
33E9000
heap
page read and write
538A000
heap
page read and write
4D5C000
heap
page read and write
4D67000
heap
page read and write
4D5C000
heap
page read and write
140123000
unkown
page read and write
D3E000
stack
page read and write
4E30000
heap
page read and write
33EA000
heap
page read and write
1C5000
heap
page read and write
4DBA000
heap
page read and write
E87000
heap
page read and write
35D0000
heap
page read and write
4D4D000
heap
page read and write
401000
unkown
page execute and read and write
18E000
stack
page read and write
3130000
heap
page read and write
EB1000
heap
page read and write
92B000
heap
page read and write
4DAD000
heap
page read and write
1400FB000
unkown
page readonly
E5000
heap
page read and write
DD5000
heap
page read and write
2A01000
heap
page read and write
33EB000
heap
page read and write
938000
unkown
page execute and write copy
EB4000
heap
page read and write
1910000
heap
page read and write
D35000
stack
page read and write
140121000
unkown
page read and write
E31000
heap
page read and write
7ED000
stack
page read and write
DD6000
heap
page read and write
401000
unkown
page execute and read and write
33E9000
heap
page read and write
7CE000
stack
page read and write
33E2000
heap
page read and write
4D93000
heap
page read and write
D29000
stack
page read and write
33E6000
heap
page read and write
3294000
heap
page read and write
4D7A000
heap
page read and write
1CC000
heap
page read and write
4D83000
heap
page read and write
2A0D000
heap
page read and write
D26000
stack
page read and write
4D93000
heap
page read and write
4DAA000
heap
page read and write
33EA000
heap
page read and write
2AB0000
heap
page read and write
15B000
heap
page read and write
D1E000
stack
page read and write
E81000
heap
page read and write
EB8000
heap
page read and write
4D50000
heap
page read and write
92E000
heap
page read and write
4DAD000
heap
page read and write
E64000
heap
page read and write
4D50000
heap
page read and write
E81000
heap
page read and write
1C5000
heap
page read and write
16CE000
stack
page read and write
693F000
stack
page read and write
400000
unkown
page readonly
3134000
heap
page read and write
ED3000
heap
page read and write
1400DF000
unkown
page readonly
1B5000
heap
page read and write
140000
heap
page read and write
3479000
heap
page read and write
EE4000
heap
page read and write
33E4000
heap
page read and write
E69000
heap
page read and write
110000
heap
page read and write
EB4000
heap
page read and write
4CE0000
heap
page read and write
4DAD000
heap
page read and write
4D73000
heap
page read and write
140000
heap
page read and write
4EC000
unkown
page execute and read and write
1A0000
heap
page read and write
14011F000
unkown
page read and write
E50000
heap
page read and write
4DBA000
heap
page read and write
666000
unkown
page execute and write copy
33E5000
heap
page read and write
916000
heap
page read and write
E58000
heap
page read and write
D83000
heap
page read and write
4D4D000
heap
page read and write
D47000
stack
page read and write
3460000
heap
page read and write
328E000
stack
page read and write
140000000
unkown
page readonly
EC8000
heap
page read and write
33EA000
heap
page read and write
4D93000
heap
page read and write
4DBA000
heap
page read and write
DE0000
heap
page read and write
4D7A000
heap
page read and write
4DE4000
heap
page read and write
4DE2000
heap
page read and write
D23000
stack
page read and write
33E3000
heap
page read and write
140001000
unkown
page execute read
1400FB000
unkown
page readonly
4E19000
heap
page read and write
D98000
heap
page read and write
7DC000
stack
page read and write
90000
heap
page read and write
4CD8000
heap
page read and write
33E0000
heap
page read and write
E58000
heap
page read and write
140001000
unkown
page execute read
4D7A000
heap
page read and write
4D7A000
heap
page read and write
4D48000
heap
page read and write
4DF9000
heap
page read and write
93A000
unkown
page write copy
190000
heap
page read and write
3520000
heap
page read and write
EB8000
heap
page read and write
5387000
heap
page read and write
4E2000
unkown
page execute and read and write
100000
heap
page read and write
4F4000
unkown
page execute and read and write
33EA000
heap
page read and write
4DF7000
heap
page read and write
33E0000
heap
page read and write
E34000
heap
page read and write
140000000
unkown
page readonly
EC9000
heap
page read and write
1400DF000
unkown
page readonly
4D62000
heap
page read and write
7D7000
stack
page read and write
9A000
stack
page read and write
140120000
unkown
page write copy
4D6A000
heap
page read and write
93A000
unkown
page read and write
93A000
unkown
page write copy
4D73000
heap
page read and write
356E000
stack
page read and write
33EF000
heap
page read and write
552F000
stack
page read and write
2AA3000
heap
page read and write
14011C000
unkown
page write copy
14012A000
unkown
page readonly
4D93000
heap
page read and write
140000000
unkown
page readonly
33EA000
heap
page read and write
128E000
stack
page read and write
E74000
heap
page read and write
E58000
heap
page read and write
4D7A000
heap
page read and write
4E12000
heap
page read and write
4D7A000
heap
page read and write
4E18000
heap
page read and write
4DAD000
heap
page read and write
2A00000
heap
page read and write
4D7A000
heap
page read and write
4DAD000
heap
page read and write
1400FB000
unkown
page readonly
D2C000
stack
page read and write
4D83000
heap
page read and write
17E0000
heap
page read and write
14011F000
unkown
page read and write
D80000
heap
page read and write
14011C000
unkown
page read and write
2A08000
heap
page read and write
14011C000
unkown
page read and write
4D73000
heap
page read and write
916000
heap
page read and write
4D5C000
heap
page read and write
CF0000
trusted library section
page read and write
33E4000
heap
page read and write
4D66000
heap
page read and write
4CD8000
heap
page read and write
D8000
heap
page read and write
4D67000
heap
page read and write
1CD000
heap
page read and write
D4A000
stack
page read and write
4DE4000
heap
page read and write
33EA000
heap
page read and write
926000
heap
page read and write
7AA000
unkown
page execute and read and write
140001000
unkown
page execute read
ED6000
heap
page read and write
5D3F000
stack
page read and write
33EC000
heap
page read and write
33EE000
heap
page read and write
33E1000
heap
page read and write
4D50000
heap
page read and write
4DBA000
heap
page read and write
EE6000
heap
page read and write
E74000
heap
page read and write
4D93000
heap
page read and write
4D72000
heap
page read and write
8C7000
heap
page read and write
4DE2000
heap
page read and write
4D7A000
heap
page read and write
ED6000
heap
page read and write
EC3000
heap
page read and write
7D7000
stack
page read and write
E53000
heap
page read and write
D26000
stack
page read and write
EE6000
heap
page read and write
8EA000
heap
page read and write
14011D000
unkown
page write copy
400000
unkown
page readonly
3220000
trusted library allocation
page read and write
4DF1000
heap
page read and write
4CE000
unkown
page execute and read and write
4E17000
heap
page read and write
4D40000
heap
page read and write
93A000
unkown
page read and write
142000
heap
page read and write
1B0000
heap
page read and write
29E0000
heap
page read and write
100000
heap
page read and write
7D4000
stack
page read and write
33E6000
heap
page read and write
E50000
heap
page read and write
140122000
unkown
page write copy
4D90000
heap
page read and write
4E2D000
heap
page read and write
7E5000
stack
page read and write
4D4D000
heap
page read and write
4DF9000
heap
page read and write
341C000
stack
page read and write
90000
heap
page read and write
D0000
heap
page read and write
4D6A000
heap
page read and write
4D7A000
heap
page read and write
8C6000
unkown
page execute and read and write
146000
heap
page read and write
EED000
heap
page read and write
4D5C000
heap
page read and write
92E000
heap
page read and write
5240000
heap
page read and write
1C3000
heap
page read and write
14011D000
unkown
page write copy
E64000
heap
page read and write
140122000
unkown
page write copy
5370000
heap
page read and write
4DBA000
heap
page read and write
5530000
heap
page read and write
36D0000
heap
page read and write
92E000
heap
page read and write
DD5000
heap
page read and write
1C8000
heap
page read and write
538E000
heap
page read and write
E30000
heap
page read and write
941000
heap
page read and write
140001000
unkown
page execute read
4DE4000
heap
page read and write
5540000
trusted library allocation
page read and write
4DAD000
heap
page read and write
140120000
unkown
page write copy
400000
unkown
page readonly
1400DF000
unkown
page readonly
2AA0000
heap
page read and write
EC3000
heap
page read and write
4EC000
unkown
page execute and read and write
547B000
heap
page read and write
5381000
heap
page read and write
190000
heap
page read and write
347B000
heap
page read and write
4D7A000
heap
page read and write
14012A000
unkown
page readonly
4DF9000
heap
page read and write
4D48000
heap
page read and write
4D90000
heap
page read and write
E5F000
heap
page read and write
36BC000
stack
page read and write
4CD5000
heap
page read and write
33E7000
heap
page read and write
14011C000
unkown
page write copy
161000
heap
page read and write
4DF1000
heap
page read and write
4E2000
unkown
page execute and read and write
DAF000
heap
page read and write
DAC000
heap
page read and write
4930000
trusted library allocation
page read and write
33E7000
heap
page read and write
4DA9000
heap
page read and write
33EC000
heap
page read and write
4DBA000
heap
page read and write
DBD000
stack
page read and write
A0000
heap
page read and write
666000
unkown
page execute and write copy
4D48000
heap
page read and write
D23000
stack
page read and write
4D7A000
heap
page read and write
613C000
stack
page read and write
4D50000
heap
page read and write
31CF000
stack
page read and write
4DAD000
heap
page read and write
There are 443 hidden memdumps, click here to show them.